scholarly journals Secure user Browser Activity using Hybrid Data Hiding Techniques

Web browsers may delete some files but it doesn’t delete everything. The purpose of private browsing is for users to browse private mode just as a standard browsing session would, but without storing any data such as log-in credentials or browsing history upon exit. A secure framework to secure the web browser artefacts is proposed to fulfil the requirements. In order to compare and contrast the different methods of artefacts encryption, a hybrid method was introduced; Base64 + AES on the prototype. The test systems were created by utilising virtual machines. The prototype was developed using C# language in Microsoft Visual Studio application that runs on Windows. To provide countermeasures, this research proposes an implementation of a third-party privacy application, called PRINDOW, to improve security in hiding a user's browsing activity. Every browsing session is recorded and scanned using the prototype. This method allows only the base requirements to be installed on the virtual machine for each file with the cryptographic method. This framework could theoretically enhance current practises by making slight changes to the web browser's application structure.

2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


2019 ◽  
Vol 11 (7) ◽  
pp. 147 ◽  
Author(s):  
Masaki Kohana ◽  
Shinji Sakamoto ◽  
Shusuke Okamoto

Real-time web applications such as a virtual world require considerable computing resources. However, as the number of servers increases, so does the maintenance and financial cost. To share tasks among web browsers, the browsers must share data. Therefore, a network must be constructed among the web browsers. In this paper, we propose the construction of a web browser network based on the Barabasi–Albert model (BA model). We focus on a web-based multiplayer online game that requires higher frequent communication and significant computing resources. We attempt to optimize computing resource utilization for web browsers. We improve upon the method in our previous study, which constructed a network for a web-based virtual world, using only location information. When a new user logged into a world, the web browser connected to two other browsers whose users had a location close to that of the user. The experimental results of that method showed 50% data coverage, which was insufficient to display the game screen because the web browser displays the characters on the virtual world. In this study, we attempt to use the BA model to construct more efficient networks than those in the previous study to increase data coverage. Our new method uses the number of connections of the web browser and location information to calculate the probability of web browser selection. The experimental results show that the data coverage exceeds 90%, indicating significant improvement over the previous method.


2017 ◽  
Vol 11 (2) ◽  
pp. 49-63 ◽  
Author(s):  
Harshad Suryakant Wadkar ◽  
Arun Mishra ◽  
Arati M. Dixit

In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.


2012 ◽  
pp. 239-273
Author(s):  
Sarah Vert

This chapter focuses on the Internet working environment of Knowledge Workers through the customization of the Web browser on their computer. Given that a Web browser is designed to be used by anyone browsing the Internet, its initial configuration must meet generic needs such as reading a Web page, searching for information, and bookmarking. In the absence of a universal solution that meets the specific needs of each user, browser developers offer additional programs known as extensions, or add-ons. Among the various browsers that can be modified with add-ons, Mozilla’s Firefox is perhaps the one that first springs to mind; indeed, Mozilla has built the Firefox brand around these extensions. Using this example, and also considering the browsers Google Chrome, Internet Explorer, Opera and Safari, the author will attempt to demonstrate the potential of Web browsers in terms of the resources they can offer when they are customizable and available within the working environment of a Knowledge Worker.


Author(s):  
Annisa Dwi Oktavianita ◽  
Hendra Dea Arifin ◽  
Muhammad Dzulfikar Fauzi ◽  
Aulia Faqih Rifa'i

A RAM or formerly known as a memory is a primary memory which helps swift data availability without waiting the whole data processed by the hard disk. A memory is also used by all installed applications including web browsers but there have been disappointed in cases of memory usages. Researchers use a descriptive quantitative approach with an observation, a central tendency and a dispersion method. There are 15 browsers chosen by random to be tested with low, medium and high loads to get their memory usage logs. Researchers proceed to analyze the log by using descriptive statistics to measure the central tendency and dispersion of data. A standard reference value from web application memory usage has been found as much as 393.38 MB. From that point, this research is successful and has been found the result. The web browser with the lowest memory usage is Flock with 134.67 MB and the web browser with the highest memory usage is Baidu with 699.66 MB.


2022 ◽  
Vol 15 (1) ◽  
pp. 1-23
Author(s):  
Rizwan Ur Rahman ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and the content of phishing page. Phish-Shelter is based on combined supervised machine learning model.Phish-Shelter browser uses two novel feature set, which are used to determine the web page identity. The proposed feature sets include eight features to evaluate the obfuscation-based rule, and eight features to identify search engine. Further, we have taken eleven features which are used to discover contents, and blacklist based rule. Phish-Shelter exploited matching identity features, which determines the degree of similarity of a URL with the blacklisted URLs. Proposed features are independent from third-party services such as web browser history or search engines result. The experimental results indicate that, there is a significant improvement in detection accuracy using proposed features over traditional features.


Author(s):  
Shashank Gupta ◽  
B. B. Gupta

Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.


Author(s):  
Shashank Gupta ◽  
B. B. Gupta

Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.


Author(s):  
Ziye Yang ◽  
Haifeng Fang ◽  
Yingjun Wu ◽  
Chunqi Li

In virtualized environments, the customers who purchase virtual machines (VMs) from a third-party cloud would expect that their VMs run in an isolated manner. However, the performance of a VM can be negatively affected by co-resident VMs. In this paper, the authors propose vExplorer, a distributed VM I/O performance measurement and analysis framework, where one can use a set of representative I/O operations to identify the I/O scheduling characteristics within a hypervisor, and potentially leverage this knowledge to carry out I/O based performance attacks to slow down the execution of the target VMs. The authors evaluate their prototype on both Xen and VMware platforms with four server benchmarks and show that vExplorer is practical and effective. The authors also conduct similar tests on Amazon’s EC2 platform and successfully slow down the performance of target VMs.


2020 ◽  
Author(s):  
Inge M. N. Wortel ◽  
Johannes Textor

AbstractSummaryThe Cellular Potts Model (CPM) is a powerful in silico method for simulating diverse biological processes at tissue scale. Because of its inherently graphical nature, this model should in theory be accessible to a large audience of biologists – without requiring extensive mathematical expertise. But in practice, CPMs are mostly implemented in specialized frameworks that users need to master before they can run and modify the simulation. We here present Artistoo (Artificial Tissue Toolbox), a JavaScript library for building “explorable” CPM simulations where users can change model parameters and see their effects in real time. Artistoo simulations run directly in the web browser and do not require any third-party software, plugins, or back-end servers. Although implemented in JavaScript, Artistoo does not suffer from a major performance loss compared to frameworks written in C++; it remains sufficiently fast to let users interact with simulations in real time. Artistoo provides an opportunity to unlock CPM models for a broader audience: interactive simulations can be shared through a simple URL in a zero-install setting. We discuss how such model sharing may benefit modelling research, science dissemination, open science, and education.Availability and ImplementationArtistoo is an open-source library released under the MIT license, and is freely available on GitHub at https://github.com/ingewortel/[email protected]


Sign in / Sign up

Export Citation Format

Share Document